Impact
Multiple flaws within the BIND 9 DNS server allow attackers to craft DNS messages whose CLASS is not Internet (IN) – for example, CHAOS or HESIOD – or that use meta-classes such as ANY or NONE in the question section. When such requests reach the affected code paths, including recursive queries, dynamic updates, zone change notifications, or processing of IN-specific record types in non-IN data, assertion failures are triggered. These failures can crash the server process, potentially leading to service unavailability for clients that rely on DNS resolution. The weaknesses involve improper bounds checking (CWE-125), unsafe input handling (CWE-20), and improper control flow (CWE-617, CWE-754, CWE-843).
Affected Systems
ISC BIND 9 is affected. The vulnerability applies to BIND 9 releases from 9.11.0 through 9.16.50, 9.18.0 through 9.18.48, 9.20.0 through 9.20.22, 9.21.0 through 9.21.21, as well as the corresponding security‑patch releases 9.11.3‑S1 through 9.16.50‑S1, 9.18.11‑S1 through 9.18.48‑S1, and 9.20.9‑S1 through 9.20.22‑S1.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity. Because the EPSS score is not available, the current likelihood of exploitation is unknown, and the vulnerability is not listed in the CISA KEV catalog. Attackers can potentially leverage open DNS resolvers to send malicious queries, exploiting the flaw over the network. While the outage is limited to the affected server, a compromised DNS service can disrupt all downstream applications that depend on it.
OpenCVE Enrichment
Debian DSA